Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks

被引:48
作者
Cao, Xuefei [1 ]
Zeng, Xingwen [2 ,3 ]
Kou, Weidong [4 ]
Hu, Liangbing [5 ]
机构
[1] China Mobile Res Inst, Dept Terminal Technol, SIM Lab, Beijing 100053, Peoples R China
[2] Xidian Univ, Acad Amd Sect, Xian 710071, Peoples R China
[3] Xidian Univ, Coll Telecommun, Xian 710071, Peoples R China
[4] IBM China, IBM Software Grp, Beijing 100094, Peoples R China
[5] Xidian Univ, Natl Key Lab Radar Signal Proc, Xian 710071, Peoples R China
关键词
Anonymity; identity-based; nonrepudiation; pairing; remote authentication; SCHEME; SIGNATURES;
D O I
10.1109/TVT.2009.2012389
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Based on identity-based cryptography, this paper proposes a remote authentication protocol featured with client anonymity, nonrepudiation, and improved efficiency for value-added services in a mobile environment. First, an identity-based signature scheme is proposed, and the verification result of the signature is a constant with respect to the signer's identifier. Then, a remote authentication protocol is constructed by combining the proposed signature scheme with a new concept called the client account index, which helps to realize client anonymity with no encryption operations. A formal proof and a theoretical analysis are provided to show the security strength of the proposals. Performance evaluation shows that compared with previous identity-based remote authentication schemes, the new protocol reduces at least 21.7% of the overall running time with stronger security; the reductions in the overall running time and signaling traffic reach 31.9% and 82.0%, respectively, compared with previous Rivest-Shamir-Adleman-based schemes.
引用
收藏
页码:3508 / 3517
页数:10
相关论文
共 28 条
[21]   Security arguments for digital signatures and blind signatures [J].
Pointcheval, D ;
Stern, J .
JOURNAL OF CRYPTOLOGY, 2000, 13 (03) :361-396
[22]   On broadcast authentication in wireless sensor networks [J].
Ren, Kui ;
Lou, Wenjing ;
Zeng, Kai ;
Moran, Patrick J. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (11) :4136-4144
[23]   A novel privacy preserving authentication and access control scheme for pervasive computing environments [J].
Ren, Kui ;
Lou, Wenjing ;
Kim, Kwangjo ;
Deng, Robert .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2006, 55 (04) :1373-1384
[24]   Anonymous wireless authentication on a portable cellular mobile system [J].
Wang, SJ .
IEEE TRANSACTIONS ON COMPUTERS, 2004, 53 (10) :1317-1329
[25]  
Yang C, 2007, LECT NOTES COMPUT SC, V4610, P306
[26]   An identity-based signature scheme from the Weil pairing [J].
Yi, X .
IEEE COMMUNICATIONS LETTERS, 2003, 7 (02) :76-78
[27]   Securing mobile ad hoc networks with certificateless public keys [J].
Zhang, Yanchao ;
Liu, Wei ;
Lou, Wenjing ;
Fang, Yuguang .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (04) :386-399
[28]   MASK: Anonymous on-demand routing in mobile ad hoc networks [J].
Zhang, Yanchao ;
Liu, Wei ;
Lou, Wenjing ;
Fang, Yuguang .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2006, 5 (09) :2376-2385